| Book Review | Chapter 34 or C34 [A6-A] | C35 [A6-B] |
| A Manager's Guide to Implement Your Crisis Management Plan | Terrorism, Civil Unrest and Demonstrations | Kidnap and Hostage Situations |
|
|
|
|
| C36 [A6-C] | C37 [A6-D] | C38 [A6-E] |
| Extortion or Blackmail | Threats against People | Threats against Property |
| Staff Accident | Death at Work | Protest at University |
| TSP Failure | Misinformation | Internal Fraud |
| Cybersecurity Attacks | ||
| Malware | Phishing | Ransomware |
| Cybersecurity Attacks | ||
| DDoS | Data Breach | |
To learn more about the course and schedule, click the buttons below for the CM-300 Crisis Management Implementer [CM-3] and the CM-5000 Crisis Management Expert Implementer [CM-5].
|
Please feel free to send us a note if you have any questions. |
||||